Next generation cryptographic ransomware
We are assisting at an evolution in the ecosystem of cryptoware—the malware that encrypts
files and makes them unavailable unless the victim pays up. New variants are taking the …
files and makes them unavailable unless the victim pays up. New variants are taking the …
[PDF][PDF] Applied professional ethics for the reluctant roboticist
JP Sullins - The emerging policy and ethics of human-robot …, 2015 - openroboethics.org
Since robots are designed to interact with humans, robotics applications always have ethical
implications. Until recent decades, most robotics applications were of an industrial nature …
implications. Until recent decades, most robotics applications were of an industrial nature …
A framework for cyber ethics and professional responsibility in computing
In this study, a model was developed for cyber ethics and professional responsibility in
computing. There is a need for every mobile phone user to have access to cyber ethics and …
computing. There is a need for every mobile phone user to have access to cyber ethics and …
Analysis, detection, and prevention of cryptographic ransomware
ZA Genç - 2020 - orbilu.uni.lu
Cryptographic ransomware encrypts files on a computer system, thereby blocks access to
victim's data, until a ransom is paid. The quick return in revenue together with the practical …
victim's data, until a ransom is paid. The quick return in revenue together with the practical …
The relevance, effectiveness, and future prospects of cyber deception implementation within organizations
K Eng, J King, C Schillaci… - Assurance and Security …, 2024 - spiedigitallibrary.org
Artificial Intelligence (AI) and Machine Learning (ML) based systems have seen tremendous
progress in the past years. This unprecedent growth has also opened new challenges and …
progress in the past years. This unprecedent growth has also opened new challenges and …
A Survey of Ethical Agreements in Information Security Courses
B Chukuka, M Locasto - Proceedings of the 47th ACM Technical …, 2016 - dl.acm.org
Existing ethical agreements, as applicable in the teaching of information security courses,
typically spell out rules on what students should and should not do. The main problem is that …
typically spell out rules on what students should and should not do. The main problem is that …
Design and development of Malware Repository with multi-user access and charactheristics aggregation
GMT Homb, MC Birkeland, CS Isnes, E Husbyn - 2021 - ntnuopen.ntnu.no
The NTNU Malware Lab wished to develop a platform for analysis and storage of malware
and legitimate programs where users can upload and download files, as well as viewing …
and legitimate programs where users can upload and download files, as well as viewing …
[PDF][PDF] The Impact of Ethical Regulation and Developer Reputation Scoring on Information Security Professionalism Practice
B Chukuka - 2016 - prism.ucalgary.ca
We consider the forces of ethical regulation and developer licensing in a software liability
attribution regime as two factors that may influence the information security discipline. We …
attribution regime as two factors that may influence the information security discipline. We …
[CITATION][C] Ethics committees are not enough
SO Hansson - Theoria, 2024 - Wiley Online Library
Two major discussions on research ethics emerged in the aftermath of World War 2 (WW2).
One of them concerned the outcomes of scientific research. It focused on dangerous …
One of them concerned the outcomes of scientific research. It focused on dangerous …